Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for providing unified transport and security protocols

a technology of unified transport and security protocols, applied in the direction of program control, unauthorized memory use protection, instruments, etc., can solve the problems that udp generally does not provide the reliability and ordering guarantees provided by protocols, and achieves superior security in internet protocol security, avoid packet loss, and reduce computational overhead

Inactive Publication Date: 2013-02-05
AUNIGMA NETWORK SECURITY CORP
View PDF34 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention describes a new transport and security protocol that combines the features of the User Datagram Protocol (UDP) with the reliability and ordering guarantees of the Transmission Control Protocol (TCP). The protocol includes a secure frame layer (SFL) transport and security protocol for managing data transfer and authentication for packets communicated between network devices. It also includes a privacy protected UDP extension referred to as Secure Persistent UDP (SPUDP) that addresses UDP packet loss, maintains communication sessions, and defends against denial of service attacks. The protocol can be used to prevent denial of service attacks at both the requester device and the responder device, and it is less vulnerable to denial of service or distributed denial of service attacks than other protocols based on signatures or Public Key Infrastructure (PKI) certificates. The protocol also includes an Initial Configuration Stage, a Session Mutual Authentication Stage, a Dynamic Data Communication Stage, a receive mode, a recovery mode, a retransmission mode, and an update mode. It is designed to prevent denial of service or distributed denial of service attacks and to ensure statelessness.

Problems solved by technology

However, UDP generally does not provide the reliability and ordering guarantees provided by protocols such as the Transmission Control Protocol (TCP), as datagrams may be dropped without notice or arrive out of order.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for providing unified transport and security protocols
  • System and method for providing unified transport and security protocols
  • System and method for providing unified transport and security protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]According to one aspect of the invention, FIG. 1 illustrates an exemplary system 100 for providing unified transport and security protocols to prevent denial of service attacks. In particular, the present disclosure generally pertains to a transport and security protocol that provides an identity based and privacy protected access control filter that can counter denial of service (DoS) and distributed denial of service (DDos) attacks. In one implementation, the transport and security protocol described in further detail herein may be considered stateless because the system 100 employing the transport and security protocol does not create a state for an authentication request unless the system 100 determines that the authentication request originates from a legitimate user. Moreover, the transport and security protocol can be considered stateless for both a client device and an authentication server because both the client device and the authentication server can use the transp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may include a Secure Frame Layer transport and security protocol that includes stages for initially configuring a requester device and a responder device, identifying the requester device and the responder device to one another, and authenticating message frames communicated between the requester device and the responder device. Additionally, the unified transport and security protocols may further include a Secure Persistent User Datagram Protocol that includes modes for processing message frames received at the requester device and the responder device, recovering the requester device in response to packet loss, retransmitting lost packets sent between the requester device and the responder device, and updating location information for the requester device to restore a communications session between the requester device and the responder device.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is related to U.S. patent application Ser. No. 10 / 956,568, entitled “System and Method for Protecting Network Resources from Denial of Service Attacks,” filed Oct. 1, 2004, which issued as U.S. Pat. No. 7,774,841 on Aug. 10, 2010, and to U.S. patent application Ser. No. 11 / 694,174, entitled “System and Method for Protecting Communication Devices from Denial of Service Attacks,” filed Mar. 30, 2007, which issued as U.S. Pat. No. 7,937,759 on May 3, 2011, the contents of which are hereby incorporated by reference in their entirety.FIELD OF THE INVENTION[0002]The invention generally relates to a system and method for providing unified transport and security protocols, and in particular, to a Secure Frame Layer transport and security protocol that includes stages for initially configuring a requester device and a responder device, identifying the requester device and the responder device to one another, and authenticating mes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F17/00
CPCH04L63/126H04L63/1458H04L69/166H04L67/104H04L69/16H04L63/02H04L63/0869
Inventor GARRARD, KENNETH W.ELLIOTT, KARL E.HUANG, ANDY
Owner AUNIGMA NETWORK SECURITY CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products